International Research Journal of Engineering and Technology (IRJET) Volume: 04 Issue: 09 | Sep-2017
www.irjet.net
e-ISSN: 2395-0056 p-ISSN: 2395-0072
A Multiple Access Technique for Differential Noise Shift Keying: A review of relevant studies Vijay Prakash Singh1, Dr. Ajay Somkunwar2, Dr. Anubhuti Khare3 Research scholar, U.I.T RGPV Bhopal-MP INDIA 2 Professors, MANIT Bhopal- MP INDIA 3 Associate Professor, U.I.T. RGPV, Bhopal- MP INDIA ---------------------------------------------------------------------***--------------------------------------------------------------------1
Abstract - Due to the continuous broadband feature, the chaotic signals are used for encoding information in the spread spectrum communications. There are numerous shift keying techniques addressed such as CCDMA, FDMA, and DCSK. This research study presents a review on the shift keying methods, and multiple access technique for differential chaos shift keying. A detailed literature that describes each of the shift keying methods are presented. This research serves as a reference for the upcoming researches on differential chaos shift keying.
1. To study and understand the Multiple Access Technique for Differential Chaos Shift Keying 2. To find the various applications of Multiple Access Technique for Differential Chaos Shift Keying 3. To review the recent advances and novel enhancements to the Multiple Access Technique for Differential Chaos Shift Keying 3. COMPARATIVE STUDIES According to Yue et al. (2014), the DCSK used a chaotic signal as the carrier for transmission. The chaotic signal was generated by the simple Logistic chaotic map circuit. The Orthogonal Variable Spreading Factor (OVSF) code was used as spreading because of its complete orthogonality and easy generation. This study proposed a new multiple access scheme based on OVSF. The binary DCSK modulation unit transmitted a reference segment of the chaotic signal during the first half of the symbol duration. The second part of the bit served as an information-bearing signal, which depends on whether bit “-1” or”1” is being transmitted. The second part was spread by a unique OVSF code sequence. At the multiple access DCSK receiver, the received signal was first correlated with its delayed version and was de-spread by the OVSF code.
Key Words: CDMA1, DCSK2, FDMA3
1. INTRODUCTION As the technology progress increases rapidly, the wireless communication system comprises of large number of homogeneous and heterogeneous sensor nodes that communicate in wireless fashion to attain the research objectives. Homogeneous nodes are more preferred over heterogeneous nodes due to its less complexity and proper manageability. By means of radio communication range, each of the sensor nodes communicate with other sensor nodes (Rathi et al. 2012).The coherent transmission systems have dominated the world of wireless communication system. The coherent systems provide a number of benefits over the noncoherent systems (Leaven et al. 2010). Application of chaos to the digital communication particularly has studied intensely during the previous decades. The chaotic code division multiple access (CCDMA) and the Differential Chaos Shift Keying (DCSK) have been widely inspected in several studies. The former operates based on the coherent demodulation, where an identical and synchronized chaotic spreading signal was required at the receiver side. Relays could be used with conventional multiple access methods like Time Division Multiple Access (TDMA), Frequency Division Multiple Access (FDMA), and Code Division Multiple Access (CDMA). This research study provides review of relevant researches that have been done in chaos shift keying 2.
The typical RFID communication system uses the asymmetrical traffic loads between the uplink and the downlink. The commands and the data broadcasted to all the tags were small from the reader in downlink, but in case of uplink, a great number of tags transmit the heavy traffic to the reader. The multiple access DCSK modulation could be used in the tag to reader link in order to detect multiple tags simultaneously. The DCSK transmitter integrated on the RFID uplink provided a robust, against multi path and high security communication with low power and low complexity. Li et al. (2004) depicted the block diagram of the transmitter and receiver of the CDMA-DCSK system shown below in Figure 1 and Figure 2. Due to slight modification of the original DCSK system, the CDMA-DCSK could be easily instigated. In DCSK modulation, the bit information was mapped to mϵ{-1, +1} and the basic function is given by as follows,
RESEARCH OBJECTIVES
The research is undertaken with following research objectives:
© 2017, IRJET
|
Impact Factor value: 5.181
Gm(k)={x(k) for 0≤L; mx(k-L) for L≤ k < 2L
|
ISO 9001:2008 Certified Journal
|
Page 617